Design and implementation
Revisiting the V-diagram from Figure 5.3, we can see that requirements from the cybersecurity concept are further refined into cybersecurity specifications, which are allocated to the architecture and its sub-components. The primary objective of the cybersecurity specifications is to ensure that the architecture fulfills cybersecurity requirements from the higher level (such as the concept or parent components). Here, existing architectural specifications may be leveraged to satisfy this work product by simply providing traceability to the parent cybersecurity requirements.
Next, you must refine the high-level security requirements and architectural details into component-level security requirements and architectural fragments. The set of security requirements and architectural fragments at the component level comprise the component cybersecurity specification. Let’s assume that you are developing software that provides key management services to...